Skip to content

Commit 5632d83

Browse files
broken links and edits
1 parent 41c68eb commit 5632d83

File tree

16 files changed

+27
-27
lines changed

16 files changed

+27
-27
lines changed

src/content/docs/ddos-protection/advanced-ddos-systems/api/dns-protection/index.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
pcx_content_type: how-to
33
title: Advanced DNS Protection
44
sidebar:
5-
order: 5
5+
order: 4
66
label: Configure via the API
77
head:
88
- tag: title

src/content/docs/ddos-protection/advanced-ddos-systems/api/dns-protection/json-objects.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,4 +35,4 @@ The `profile_sensitivity` field value must be one of `low` (default), `medium`,
3535

3636
The `rate_sensitivity` and `burst_sensitivity` field values must be one of `low`, `medium`, or `high`.
3737

38-
For more information on the rule settings, refer to [Rule settings](/ddos-protection/advanced-ddos-systems/rule-settings/).
38+
For more information on the rule settings, refer to [Rule settings](/ddos-protection/advanced-ddos-systems/concepts/#rule-settings).

src/content/docs/ddos-protection/advanced-ddos-systems/api/index.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: API configuration
33
pcx_content_type: overview
44
sidebar:
5-
order: 5
5+
order: 4
66
group:
77
hideIndex: true
88
head:

src/content/docs/ddos-protection/advanced-ddos-systems/api/tcp-protection/examples.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -306,4 +306,4 @@ curl https://api.cloudflare.com/client/v4/accounts/{account_id}/magic/advanced_t
306306
}
307307
```
308308

309-
Refer to [JSON objects](/ddos-protection/advanced-ddos-systems/api/tcp-protection/json-objects/) for more information on the fields in the JSON body.
309+
Refer to [JSON objects](/ddos-protection/advanced-ddos-systems/api/tcp-protection/json-objects/) for more information on the fields in the JSON body.

src/content/docs/ddos-protection/advanced-ddos-systems/api/tcp-protection/index.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
pcx_content_type: how-to
33
title: Advanced TCP Protection
44
sidebar:
5-
order: 5
5+
order: 4
66
label: Configure via the API
77
head:
88
- tag: title
@@ -109,4 +109,4 @@ The tables in the following sections summarize the available operations.
109109

110110
## Pagination
111111

112-
The API operations that return a list of items use pagination. For more information on the available pagination query parameters, refer to [Pagination](/fundamentals/api/how-to/make-api-calls/#pagination).
112+
The API operations that return a list of items use pagination. For more information on the available pagination query parameters, refer to [Pagination](/fundamentals/api/how-to/make-api-calls/#pagination).

src/content/docs/ddos-protection/advanced-ddos-systems/api/tcp-protection/json-objects.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -81,4 +81,4 @@ The `expression` field is a [Rules language expression](/ruleset-engine/rules-la
8181
Expressions of SYN flood protection and out-of-state TCP protection filters do not currently support functions.
8282
:::
8383

84-
The `mode` value must be one of `enabled`, `disabled`, or `monitoring`.
84+
The `mode` value must be one of `enabled`, `disabled`, or `monitoring`.

src/content/docs/ddos-protection/advanced-ddos-systems/concepts.mdx

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Concepts
33
pcx_content_type: concept
44
sidebar:
5-
order: 3
5+
order: 2
66
head:
77
- tag: title
88
content: Create an Advanced TCP Protection filter
@@ -32,7 +32,7 @@ For example, you could add prefixes used only by partners of your company to the
3232

3333
## Rule
3434

35-
A rule configures Advanced DDoS Protection for a given [scope](/ddos-protection/advanced-ddos-systems/rule-settings/#scope), according to several [settings](/ddos-protection/advanced-ddos-systems/rule-settings/): execution mode, burst sensitivity, and rate sensitivity.
35+
A rule configures Advanced DDoS Protection for a given [scope](/ddos-protection/advanced-ddos-systems/concepts/#scope), according to several [settings](/ddos-protection/advanced-ddos-systems/concepts/#rule-settings): execution mode, burst sensitivity, and rate sensitivity.
3636

3737
Each system component (SYN flood protection and out-of-state TCP protection) has its own list of rules, and it should have at least one rule.
3838

@@ -156,4 +156,4 @@ The mitigation reasons are the following:
156156
| **Out of sequence** | Packet dropped because its properties (for example, TCP flags or sequence numbers) do not match the expected values for the existing connection. |
157157
| **Already closed** | Packet dropped because it belongs to a connection that is already closed. |
158158

159-
Mitigation will only occur based on your Advanced TCP Protection configuration (rule sensitivities, configured allowlists and prefixes). The protection system will provide some tolerance to out-of-state packets to accommodate for the natural randomness of Internet routing.
159+
Mitigation will only occur based on your Advanced TCP Protection configuration (rule sensitivities, configured allowlists and prefixes). The protection system will provide some tolerance to out-of-state packets to accommodate for the natural randomness of Internet routing.

src/content/docs/ddos-protection/advanced-ddos-systems/how-to/add-prefix-allowlist.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,4 +20,4 @@ To add an IP address or prefix to the Advanced DDoS Protection [allowlist](/ddos
2020
5. To exclude the current prefix from the allowlist instead of including it, uncheck the **Enabled** checkbox.
2121
6. Select **Add**.
2222

23-
<Render file="allowlist-ip-spoofing" />
23+
<Render file="allowlist-ip-spoofing" />

src/content/docs/ddos-protection/advanced-ddos-systems/how-to/add-prefix.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,4 +20,4 @@ To add a [prefix](/ddos-protection/advanced-ddos-systems/concepts/#prefixes) to
2020
:::note[Note]
2121

2222
The **Add existing prefix** list will not display leased prefixes, but you can add them manually in the Cloudflare dashboard or [using the API](/ddos-protection/advanced-ddos-systems/api/). You cannot add [delegated prefixes](/byoip/concepts/prefix-delegations/) to Advanced TCP Protection.
23-
:::
23+
:::

src/content/docs/ddos-protection/advanced-ddos-systems/how-to/create-filter.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,4 +32,4 @@ To create a [filter](/ddos-protection/advanced-ddos-systems/concepts/#filter) fo
3232
4. Under **When incoming packets match**, define a filter expression using the Expression Builder (specifying one or more values for **Field**, **Operator**, and **Value**), or manually enter an expression using the Expression Editor. For more information, refer to [Edit rule expressions](/ruleset-engine/rules-language/expressions/edit-expressions/).
3333
5. Select **Save**.
3434

35-
<Render file="atp-filters-rules-precedence" />
35+
<Render file="atp-filters-rules-precedence" />

0 commit comments

Comments
 (0)